US8006110B2 - Method and apparatus for keeping a virtual private network session active on a portable computer system including wireless functionality - Google Patents
Method and apparatus for keeping a virtual private network session active on a portable computer system including wireless functionality Download PDFInfo
- Publication number
- US8006110B2 US8006110B2 US11/478,738 US47873806A US8006110B2 US 8006110 B2 US8006110 B2 US 8006110B2 US 47873806 A US47873806 A US 47873806A US 8006110 B2 US8006110 B2 US 8006110B2
- Authority
- US
- United States
- Prior art keywords
- processor
- processing unit
- computer system
- recited
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
Definitions
- This invention relates to portable computing systems and, more particularly, to platform security of portable computing systems that include wireless functionality.
- a wireless modem connection in which the cellular telephone dialing capability was exploited as a wireless dial-up modem for computers having no other network access.
- a phone-specific cable was used in conjunction with various types of communication links.
- a universal serial bus (USB) link or an EEEE 1394 (i.e., FireWireTM) link, or a wireless connection such as Bluetooth or WLAN, or the like, may be used to connect the mobile telephone to the computer.
- VPN Virtual Private Network
- This protocol using negotiated and authenticated encryption, may give the appearance, that the remote user is inside a network (e.g., the user's desktop on the remote machine may appear identical to his desktop at the office).
- One particular method for providing security in a VPN environment involves the periodic exchange of a set of packets between the remotely connected computer and the network.
- VPN protocols are typically not tolerant of current wireless technology and may be prone to a loss of connection. For example, when the remotely connected computer moves from one cell (e.g., base station) to another or is put to sleep, the VPN protocol may not recognize the computer as the same entity.
- the VPN protocol may be lost whenever the connection is lost or interrupted, or has been quiescent for some predetermined amount of time.
- use of a VPN system frequently involves the inconvenience of multiple logon screens (sometimes involving a device that employs a continually changing random number) and/or multiple passwords. This may present unacceptable levels of difficulty and consumption of time.
- the laptop computer system includes a processor that executes instructions that implement application software.
- the laptop computer system also includes-a wireless module that may communicate with a wireless network such as a wireless wide area network including wireless telephone networks, for example
- the wireless module may establish a virtual private network (VPN) connection with a computer network via the wireless network.
- the wireless module includes a processing unit that may execute instructions that cause information to be transmitted to a host portion of the virtual private network connection at one or more predetermined times.
- the processing unit may further execute instructions associated with a client portion of the VPN connection.
- the processing unit may also detect inactivity between the processor and the computer network.
- the processing unit may further execute the instructions that cause information to be transmitted to a host portion of the VPN connection in response to detecting the inactivity.
- a method of establishing a virtual private network from a laptop computer system includes a processor executing instructions that implement application software and a wireless module communicating with a wireless network.
- the method may also include the wireless module establishing a virtual private network (VPN) connection with a computer network via the wireless network, and a processing unit of the wireless module executing instructions that cause information to be transmitted to a host portion of the virtual private network connection at one or more predetermined times.
- VPN virtual private network
- FIG. 1 is a block diagram of one embodiment of a portable computer system including wireless telephony.
- FIG. 2 is a diagram depicting the embodiment of the portable computer system shown in FIG. 1 being used in a virtual private network.
- FIG. 3 is a flow diagram describing the operation of one embodiment of the portable computer system of FIG. 1 .
- FIG. 4A is a perspective view drawing of one embodiment of the portable computer system of FIG. 1 .
- FIG. 4B is a perspective view drawing of another embodiment of the portable computer system of FIG. 1 .
- Portable computer system 10 includes a processor 30 coupled to a memory 40 and to an input/output (I/O) unit 50 .
- I/O hub 50 is coupled to various I/O devices such as a display 60 , a storage device 80 , a keyboard 56 , and a wireless module 70 .
- Wireless module 70 is coupled to a low-resolution display 65 , and a power management unit 90 .
- an audio subsystem 20 is coupled between I/O unit 50 and wireless module 70 .
- computer system 10 may include various other components and circuits that have been omitted for simplicity. It is further noted that the components of the computing subsystem are depicted in FIG. 1 for illustrative purposes. It is contemplated that the functionality associated with the various components may be distributed differently such that the lines between blocks may be drawn differently. Moreover, it is entirely possible that the functionality shown in FIG. 1 may be implemented on a single integrated circuit chip, such a system on a chip (SOC) implementation, as desired.
- SOC system on a chip
- processor 30 may be illustrative of a microprocessor that implements the x86 architecture. Although in other embodiments, processor 30 may be any type of processor implemented with any type of architecture. In one embodiment, processor 30 may include a memory controller (not shown) to facilitate memory transactions directed to memory 40 , for example. In addition, processor 30 may include various interface circuits such as a host interface (not shown) for controlling transactions with I/O unit 50 .
- I/O unit 50 may be any of a variety of I/O controllers that may include bridging and graphics circuits (not shown) that may be used as interfaces between processor 30 and the various I/O devices and buses to which it is coupled.
- I/O unit 50 may be coupled to processor 30 via a HyperTransportTM link 31 .
- I/O unit 50 may include one or more HyperTransportTM to peripheral component interconnect (PCI) and/or a HyperTransportTM to universal serial bus (USB) bridges for connection to PCI and USB devices, respectively, for example.
- PCI peripheral component interconnect
- USB universal serial bus
- I/O unit 50 may be coupled to wireless module 70 via a USB, HyperTransportTM or other type of link 57 , although other interconnects are contemplated. Further, I/O unit 50 may include and graphics functionality for generation of the various signals used in association with display 60 and LR display 65 , for example.
- processor 30 may be coupled to the components of the system using a more traditional system architecture.
- processor 30 may be coupled to a bus bridge (not shown) such as a Northbridge via shared bus arrangement (e.g., front side bus.(FSB)).
- a separate bus bridge such as a Southbridge (not shown) may be coupled to the Northbridge for coupling to various other peripheral devices (e.g., storage 80 , KB 56 , etc.).
- wireless module 70 may be coupled to the Northbridge via any type of link such as a USB link, for example.
- the audio subsystem 20 may include audio functionality including analog-to-digital and digital to-analog circuits for generation of the various signals associated with microphone 79 and speaker 78 , for example.
- Storage 80 may be a mass storage device.
- storage 80 may include one or more hard disk drives.
- storage 80 may include other types of storage media such as a non-volatile random access memory (RAM) device (e.g., a memory stick, or flash drive), compact disk (CD) drive, digital video disk (DVD) drive, tape drive, floppy drive, and the like.
- RAM non-volatile random access memory
- CD compact disk
- DVD digital video disk
- tape drive floppy drive
- display 60 may be a liquid crystal display (LCD) or other type of displays such as may be common to portable laptop and notebook computers.
- LR display 65 may be a display such as the type of display used on a mobile telephone or a personal digital assistant (PDA) for example.
- PDA personal digital assistant
- LR display 65 may have a lower resolution than display 60 .
- LR display 65 may be used exclusively, while in other modes, display 60 may be used exclusively, and in still other modes, both displays may used concurrently.
- Wireless module 70 is coupled to an antenna 77 , although in other embodiments, multiple antennas may be used.
- Wireless module 70 includes a processing unit 71 and a memory 72 .
- Wireless module 70 may include the functionality of a wireless communication device such as a mobile telephone, for example.
- processing unit 71 may execute instructions and perform functions, and may include analog, digital, radio frequency (RF) and baseband circuits (not shown) that may function to perform such tasks as RF signal reception and transmission, up-conversion and down-conversion of the RF signals, analog-to-digital conversion, digital-to-analog conversion, digital signal processing of the baseband signals, as well as monitoring and control functions.
- RF radio frequency
- processing unit 71 may include hardware that includes a separate processor such as an advanced RISC machine (ARM) processor, for example, a digital signal processing unit, and/or one or more hardware accelerators for handling complex algorithms such as encryption and decryption.
- ARM advanced RISC machine
- memory 72 may be any type of memory including volatile memory such as RAM, or non-volatile memory such as Flash memory or read only memory (ROM), among others, for example.
- the instructions executed by processing unit 71 may include instructions that implement VPN client software.
- wireless module 70 may be configured to autonomously initiate and maintain a VPN connection through the Internet via a wireless network such as a wireless wide area network that may include a wireless telephone network, for example.
- wireless module 70 may also be configured to maintain the VPN connection (i.e., VPN keep-alive) irrespective of whether processor 30 , and/or the remainder of the computing subsystem are in a low-power mode such as a sleep mode, for example.
- wireless module 70 may initiate and maintain the VPN connection without any special action by software executing on processor 30 , the VPN connection becomes transparent to the user, much like a completely private intranet connection with virtually no software and/or encryption overhead by processor 30 .
- wireless module 70 may communicate with a wireless network, such as a wireless telephone network, for example.
- the wireless network may conform to any of a variety of communication standards that may be compatible with various technologies such as the second (2G), third (3G) and fourth (4G) generation mobile phone technologies.
- the wireless network may be a wireless wide area network implemented to be compatible with such protocols as WiMax, WiBro, NextNet, and others.
- wireless module 70 may employ a time-division multiple access (TDMA), a code division multiple access (CDMA) and/or a wireless CDMA (WCDMA) technique to implement standards such as the Global System for Mobile Communications (GSM) standard, the Personal Communications Service (PCS) standard, and the Digital Cellular System (DCS).
- TDMA time-division multiple access
- CDMA code division multiple access
- WCDMA wireless CDMA
- GSM Global System for Mobile Communications
- PCS Personal Communications Service
- DCS Digital Cellular System
- wireless module 70 may also implement the General Packet Radio Service (GPRS) standard, the Enhanced Data for GSM Evolution (EDGE) standard, which may include Enhanced General Packet Radio Service standard (E-GPRS) and Enhanced Circuit Switched Data (ESCD), and the high speed circuit switched data (HSCSD) standard, high speed downlink packet access (HSDPA), high speed uplink packet access (HSUPA), evolution data optimized (EV-DO), among others.
- GPRS General Packet Radio Service
- EDGE Enhanced Data for GSM Evolution
- E-GPRS Enhanced General Packet Radio Service standard
- E-GPRS Enhanced Circuit Switched Data
- HCSD high speed circuit switched data
- HSDPA high speed downlink packet access
- HSUPA high speed uplink packet access
- EV-DO evolution data optimized
- memory 40 may be a system memory that is used to store instructions and data that may be used by processor 30 as well as other devices (e.g., I/O unit 50 ).
- memory 40 may be implemented using any of a variety of volatile or non-volatile memory devices.
- memory 40 may be implemented using any number of memory devices in the dynamic RAM family of devices.
- memory 40 may be implemented using removable or non-removable memory modules with the memory devices affixed thereto.
- other memory device configurations are possible and contemplated.
- memory 40 includes telephony drivers and application software 45 stored therein. It is noted that telephony drivers and application software 45 may be stored more permanently within storage 80 and during run time, at least portions of the instructions and data being executed by processor 30 may be loaded into memory 40 .
- Portable computer system 10 may be described in terms of including a computing subsystem and a wireless subsystem.
- the computing subsystem may include the components that typically make up a computing platform.
- the computing subsystem may include processor 30 , memory 40 , I/O unit 50 , display 60 and so on.
- the wireless subsystem may include wireless module 70 , which includes processing unit 71 , memory 72 , and LR display 65 .
- portable computer system 10 may operate in various modes.
- portable computer system 10 may operate such that only the wireless module 70 may be in operation while the computing subsystem components may be in a standby or low power state.
- portable computer system 10 may be operated as a wireless communication device such as a mobile telephone or a personal digital assistant (PDA).
- PDA personal digital assistant
- LR display 65 may be used.
- the wireless subsystem may be turned off or placed in a standby mode and portable computer system 10 may operate simply as a laptop or notebook computer.
- portable computer system 10 may operate using various combinations of computing and wireless communication functionality.
- portable computer system 10 While portable computer system 10 is operated in the different modes, one or more components may be powered down or placed in a standby mode or other low power states. As such, portable computer system 10 includes a power management unit 90 that may manage the different modes and power states and any switching therebetween.
- portable computer system 10 may function as a laptop computer with a fully integrated wireless communication platform that includes voice and data transfer functionality.
- the telephony drivers and application software 45 may include instructions that may be used to configure the wireless module 70 .
- a user may select a driver via the operating system or other mechanism, for example. The driver may configure one or more operational characteristics and/or behaviors of wireless module 70 .
- the telephony drivers and application software 45 may be used to manage email, address books, phone lists, databases, calendars, and other information traditionally used on a mobile telephone.
- the application software may also include applications that may be run by processor 30 such as spreadsheet, word processing, games, and the like.
- portable computer system 10 may be used to connect remotely through the Internet to a computer network using a VPN connection. More particularly, as shown in FIG. 2 , a user may establish and maintain connection to a computer network while working at a remote location, or while traveling in a vehicle as long as a wireless connection can be established.
- a user may configure wireless module 70 for VPN use via one or more drivers executing on processor 30 or via configuration software executing on processing unit 71 .
- authentication information such as authentication keys, for example, may be stored within portable computer system 10 (e.g., within memory 72 , storage 80 , and/or memory 40 ).
- VPN client software may be executed by processing unit 71 to establish a VPN connection to a predetermined computer network.
- authentication keys may be stored, an authorized user such as a user with administrator privileges, may access portable computer system 10 remotely.
- the user may send one or packets that include commands and authentication key information to portable computer system 10 and once authorized, the commands may force a wake up of portable computer system 10 thereby enabling remote maintenance, installation and or wiping of applications and data from storage 80 , and the like.
- processing unit 71 may continue to execute the VPN client software, even during periods when processor 30 and other components of portable computer system 10 are no longer being used, and have gone into a low-power operational state. More particularly, in many VPN systems, a VPN host or gateway server may monitor the VPN connection for inactivity. If the VPN host detects inactivity for a predetermined amount of time, the VPN host may terminate the VPN connection. Similarly, some VPN client applications may also monitor the VPN connection for inactivity, and may likewise terminate the VPN connection due too inactivity for a predetermined amount of time. Accordingly, processing unit 71 may be configured to execute instructions that cause wireless module 70 to transmit information to the VPN host at predetermined times to maintain the VPN connection, which may also be referred to as keeping the connection alive.
- processing unit 71 may also be configured to cause wireless module 70 to transmit information to a pre-selected IP address to prevent the VPN client from terminating the VPN connection. It is noted that the information transmitted during “keep alive frames” may be any type of information including null packets, or other no-op instructions that do not perform any essential functions.
- transmitting keep alive information at predetermined times may keep the VPN connection active for long periods of time without user interaction. It may also allow an email client executing in the processing unit 71 to access an email server via the VPN connection.
- the email client may, depending upon user preferences, simply display a notification such as the subject line of any new emails on LR display 65 , for example, even when the host computer is in a sleep or other low-power state. As such, the user can see that new email is waiting, wake the computer, and initiate an email update, as desired.
- the email client may wake the computer, and initiate the email update by downloading and storing the email.
- these tasks may also be performed without user interaction (i.e., autonomously) dependent upon user preferences selected during the configuration process, for example.
- FIG. 2 a diagram depicting an embodiment of the portable computer system shown in FIG. 1 being used in a virtual private network is shown.
- a user 220 is operating portable computer system 10 .
- portable computer system 10 is a laptop or notebook computer.
- portable computer system 10 may initiate a wireless connection to a wireless network such as a wireless wide area network via an IP protocol, or connect to one or more base stations 230 of a wireless telephone network, via the air interface.
- the base station 230 may provide a connection to an Internet Service Provider (ISP) either by a wireless connection or a wire line connection.
- the ISP may in turn provide access to the Internet which may allow connection to VPN server 240 .
- VPN server 240 is coupled to computer network 250 , which includes computers 260 , 270 , and 280 coupled together via a local area network, for example.
- VPN server 240 may perform the functionality of the VPN host or gateway described above. As such, VPN server 240 may execute VPN host software. VPN server 240 may be configured to encrypt and decrypt the information that is sent and received, respectively, via the VPN connection. Likewise, the VPN client software executed on processing unit 71 of FIG. 1 may encrypt and decrypt the information that is sent and received, respectively, by wireless module 70 . Accordingly, processing unit 71 may include hardware encryption/decryption accelerators and/or may execute software that implements encoder/decoders to facilitate VPN functionality.
- FIG. 3 is a flow diagram describing the operation of the embodiment of the portable computer system shown in FIG. 1 .
- a user may configure operation of the wireless module 70 by selecting one or more drivers. For example, passwords, encryption keys, and other authentication information may be entered and stored, low-power state operation may be selected, remote access (e.g., IP address) information may be entered, and so on.
- drivers For example, passwords, encryption keys, and other authentication information may be entered and stored, low-power state operation may be selected, remote access (e.g., IP address) information may be entered, and so on.
- IP address e.g., IP address
- the user may establish a wireless connection to the Internet using an IP protocol, or by via dial-up by calling a telephone number to an ISP, for example (block 305 ).
- the user may launch the VPN client software 73 and select a computer network such as computer network 250 of FIG. 2 , for example, to which the user desires to connect (block 310 ).
- the VPN client software may initiate a connection request sequence with a VPN host such as VPN server 240 of FIG. 2 , for example.
- VPN server 240 may attempt to authenticate the user via an authentication protocol using authentication information provided by the VPN client software 73 . If the authentication is not successful (block 315 ), the VPN server 240 and the VPN client software 73 may log the failed attempt and VPN server 240 may refuse and terminate the connection (block 320 ).
- the VPN server 240 may process the connection request and establish a VPN connection to the computer network 250 .
- the user may then communicate with the computer network as desired in accordance with any network protocols that may be in place (block 325 ).
- processing unit 71 may execute instructions that may monitor the operational state and/or the activity of the computing subsystem. More particularly, processing unit 71 may monitor communication activity between the computing subsystem and the computer network (block 330 ).
- processing unit 71 may transmit predetermined information (e.g., keep alive information) to the computer network (block 335 ).
- predetermined information e.g., keep alive information
- the monitoring and sending of keep-alive information may continue as long as there is a general lack of activity or the computing subsystem is in a low-power state.
- processing unit 71 may detect the computing subsystem has exited or is no longer in the low-power state, the user may be completing communication with the computer network (block 340 ).
- the user may have placed portable computing system in a low-power state, such as the sleep mode while the VPN connection is still active. At some time later, the user may want to continue using the VPN connection, disconnect or shut down the system entirely. Accordingly, the user may wake up the system to do so.
- the user is not finished, operation proceeds as described above in the description of block 325 . However, if the user is finished (block 340 ), the user may choose to terminate the VPN connection.
- the VPN client software 73 may log the session in a log file and terminate the session (block 345 ). It is noted that in some embodiments, there may be no logging of the session, just termination.
- FIG. 4A and FIG. 4B are perspective view drawings of exemplary embodiments of the portable computer system including wireless functionality shown in FIG. 1 .
- FIG. 4A depicts the portable computer system 10 as a laptop computer (i.e., a notebook computer) that includes a housing 420 with a hingably attached cover 430 that is in an open position.
- FIG. 4B depicts another embodiment of the portable computer system 10 with cover 430 in a closed position.
- the cover 430 includes a display 60 such as an LCD, microelectro-mechanical (MEMS), or electronic ink (Eink), for example, that forms a part of the internal surface of the cover.
- portable computer system 10 includes an antenna 77 that is mounted to cover 430 . It is noted that the mounting location, type, and numbers of antenna 77 are implementation details. Accordingly, although antenna 77 is shown mounted to the inside of cover 230 , in other embodiments, antenna 77 may be mounted to cover 230 or housing 220 , or even internal to housing 220 as desired. In addition, antenna 77 may go entirely or partially around display 60 .
- Portable computer system 10 also includes a microphone 78 , speakers 79 A and 79 B, and a keyboard 440 , and a touch activated mouse control 415 that are mounted on a top surface of the housing 420 .
- portable computer system 10 includes an additional display unit (e.g., LR display 65 ) mounted to the top surface of housing 420 .
- display 65 may be a low-resolution display.
- LR display 65 may also be an input device (e.g., touch-activated screen) to facilitate use of a pointing device such as a stylus, for example.
- LR display 65 may include analog-to-digital conversion circuits to input data from the screen. It is noted that the location and type of LR display 65 are also implementation details. As such, LR display 65 may be located in any desired location, another example of which is shown in FIG. 4B .
- the embodiment of portable computer system 10 shown in FIG. 4B is similar to the embodiment shown in FIG. 4A .
- the embodiment of portable computer system 10 shown in FIG. 4B does not include LR display 65 mounted on the top surface of housing 420 .
- LR display 65 is mounted on the external surface of cover 430 such that LR display 65 is visible and useable when cover 430 is in the closed position.
- antenna 77 is mounted on the external surface of cover 430 , but may be mounted internal to housing 420 , or any other location, as desired.
Abstract
Description
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/478,738 US8006110B2 (en) | 2006-06-30 | 2006-06-30 | Method and apparatus for keeping a virtual private network session active on a portable computer system including wireless functionality |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/478,738 US8006110B2 (en) | 2006-06-30 | 2006-06-30 | Method and apparatus for keeping a virtual private network session active on a portable computer system including wireless functionality |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080004011A1 US20080004011A1 (en) | 2008-01-03 |
US8006110B2 true US8006110B2 (en) | 2011-08-23 |
Family
ID=38877336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/478,738 Active 2030-06-23 US8006110B2 (en) | 2006-06-30 | 2006-06-30 | Method and apparatus for keeping a virtual private network session active on a portable computer system including wireless functionality |
Country Status (1)
Country | Link |
---|---|
US (1) | US8006110B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090059899A1 (en) * | 2007-03-13 | 2009-03-05 | Gil Bendelac | Optimized packet processing architecture for battery powered mobile communication device |
US20100132032A1 (en) * | 2008-11-25 | 2010-05-27 | Lenovo (Singapore) Pte. Ltd. | Facilitating access to data from virtual private networks |
US9344215B2 (en) | 2012-10-15 | 2016-05-17 | Marvell World Trade Ltd. | Systems and methods for advanced power management for optical network terminal systems on chip |
CN106788571A (en) * | 2014-07-25 | 2017-05-31 | 山东中鸿新能源科技有限公司 | A kind of cloud terminal 3G/4G modules with highly compatible energy |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008043270A1 (en) * | 2006-09-29 | 2008-04-17 | Lenovo (Beijing) Limited | Remote wake -up system, wwan module and terminal |
US20080102747A1 (en) * | 2006-10-31 | 2008-05-01 | Mohammed Didarul Alam | SSL-Based Mobile Virtual Private Networking Solution |
US9455896B2 (en) | 2007-07-23 | 2016-09-27 | Verint Americas Inc. | Dedicated network interface |
US7975294B2 (en) * | 2007-11-19 | 2011-07-05 | International Business Machines Corporation | VPN management |
CA2721174C (en) * | 2008-04-17 | 2017-03-14 | Microsystemes Dog Inc. | Method and system for virtually delivering software applications to remote clients |
US20100039971A1 (en) * | 2008-08-15 | 2010-02-18 | Hong Kong Applied Science and Technology Research Institute, Co. | Power Management Method and Communication System |
US8463254B2 (en) * | 2008-11-25 | 2013-06-11 | Research In Motion Limited | System and method for over-the-air software loading in mobile device |
JP5418134B2 (en) * | 2009-10-16 | 2014-02-19 | 富士通株式会社 | Information terminal and computer program |
WO2013048507A1 (en) * | 2011-09-30 | 2013-04-04 | Intel Corporation | Device, system and method of maintaining connectivity over a virtual private network (vpn) |
US9489023B1 (en) * | 2013-07-18 | 2016-11-08 | Marvell International Ltd. | Secure wake on LAN with white list |
US20170243582A1 (en) * | 2016-02-19 | 2017-08-24 | Microsoft Technology Licensing, Llc | Hearing assistance with automated speech transcription |
US11064030B2 (en) * | 2019-10-17 | 2021-07-13 | Cisco Technology, Inc. | Automatic on-boarding agent for IOT edge routers in connected vehicles |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030114152A1 (en) * | 2001-12-18 | 2003-06-19 | Gibbs Benjamin K. | Wireless trickle SYNC device |
US20030182431A1 (en) * | 1999-06-11 | 2003-09-25 | Emil Sturniolo | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments |
US20040068666A1 (en) * | 2002-07-26 | 2004-04-08 | Sierra Wireless, Inc. A Canadian Corp. | Always-on virtual private network access |
US20040233930A1 (en) * | 2003-05-19 | 2004-11-25 | Modular Computing & Communications Corporation | Apparatus and method for mobile personal computing and communications |
US20050215274A1 (en) * | 2004-03-26 | 2005-09-29 | Broadcom Corporation | MAC controlled sleep mode/wake-up mode with staged wake-up for power management |
US20050273603A1 (en) * | 2001-10-30 | 2005-12-08 | Girard Luke E | Mechanism to improve authentication for remote management of a computer system |
US20060018283A1 (en) * | 2000-12-22 | 2006-01-26 | Lewis Allan D | Wireless router system and method |
US20060129861A1 (en) * | 2003-09-18 | 2006-06-15 | Kee Martin J | Portable electronic device having high and low power processors operable in a low power mode |
US20060245555A1 (en) * | 2005-05-02 | 2006-11-02 | Nokia Corporation | Dynamic message templates and messaging macros |
US20070238440A1 (en) * | 2006-03-29 | 2007-10-11 | Uttam Sengupta | Method and apparatus for a power-efficient framework to maintain data synchronization of a mobile personal computer to simulate a connected scenario |
US7295534B2 (en) * | 2003-04-17 | 2007-11-13 | Samsung Electronics Co., Ltd. | Method and apparatus for a hybrid network device for performing in a virtual private network and a wireless local area network |
US20070271606A1 (en) * | 2006-05-17 | 2007-11-22 | Amann Keith R | Apparatus and method for establishing a VPN tunnel between a wireless device and a LAN |
US20070298848A1 (en) * | 2006-06-21 | 2007-12-27 | Babin Stephen W | Method of pausing keep-alive messages and roaming for virtual private networks on handheld devices to save battery power |
US7389534B1 (en) * | 2003-06-27 | 2008-06-17 | Nortel Networks Ltd | Method and apparatus for establishing virtual private network tunnels in a wireless network |
US7565529B2 (en) * | 2004-03-04 | 2009-07-21 | Directpointe, Inc. | Secure authentication and network management system for wireless LAN applications |
US7800534B1 (en) * | 2008-01-29 | 2010-09-21 | Sprint Spectrum L.P. | System and method for determining whether to allow a base station to perform a particular base station function |
-
2006
- 2006-06-30 US US11/478,738 patent/US8006110B2/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030182431A1 (en) * | 1999-06-11 | 2003-09-25 | Emil Sturniolo | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments |
US20060018283A1 (en) * | 2000-12-22 | 2006-01-26 | Lewis Allan D | Wireless router system and method |
US20050273603A1 (en) * | 2001-10-30 | 2005-12-08 | Girard Luke E | Mechanism to improve authentication for remote management of a computer system |
US20030114152A1 (en) * | 2001-12-18 | 2003-06-19 | Gibbs Benjamin K. | Wireless trickle SYNC device |
US20040068666A1 (en) * | 2002-07-26 | 2004-04-08 | Sierra Wireless, Inc. A Canadian Corp. | Always-on virtual private network access |
US7295534B2 (en) * | 2003-04-17 | 2007-11-13 | Samsung Electronics Co., Ltd. | Method and apparatus for a hybrid network device for performing in a virtual private network and a wireless local area network |
US20040233930A1 (en) * | 2003-05-19 | 2004-11-25 | Modular Computing & Communications Corporation | Apparatus and method for mobile personal computing and communications |
US7389534B1 (en) * | 2003-06-27 | 2008-06-17 | Nortel Networks Ltd | Method and apparatus for establishing virtual private network tunnels in a wireless network |
US20060129861A1 (en) * | 2003-09-18 | 2006-06-15 | Kee Martin J | Portable electronic device having high and low power processors operable in a low power mode |
US7565529B2 (en) * | 2004-03-04 | 2009-07-21 | Directpointe, Inc. | Secure authentication and network management system for wireless LAN applications |
US20050215274A1 (en) * | 2004-03-26 | 2005-09-29 | Broadcom Corporation | MAC controlled sleep mode/wake-up mode with staged wake-up for power management |
US20060245555A1 (en) * | 2005-05-02 | 2006-11-02 | Nokia Corporation | Dynamic message templates and messaging macros |
US20070238440A1 (en) * | 2006-03-29 | 2007-10-11 | Uttam Sengupta | Method and apparatus for a power-efficient framework to maintain data synchronization of a mobile personal computer to simulate a connected scenario |
US20070271606A1 (en) * | 2006-05-17 | 2007-11-22 | Amann Keith R | Apparatus and method for establishing a VPN tunnel between a wireless device and a LAN |
US20070298848A1 (en) * | 2006-06-21 | 2007-12-27 | Babin Stephen W | Method of pausing keep-alive messages and roaming for virtual private networks on handheld devices to save battery power |
US7800534B1 (en) * | 2008-01-29 | 2010-09-21 | Sprint Spectrum L.P. | System and method for determining whether to allow a base station to perform a particular base station function |
Non-Patent Citations (1)
Title |
---|
"Enabling Notebook Users with Wide-Area Broadband Access;" QUALCOMM Incorporated, Sep. 2005, http://www.qualcomm.com/common/documents/white-papers/Embedded-CDMANotebook.pdf. |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090059899A1 (en) * | 2007-03-13 | 2009-03-05 | Gil Bendelac | Optimized packet processing architecture for battery powered mobile communication device |
US8493966B2 (en) * | 2007-03-13 | 2013-07-23 | Marvell International Ltd. | Optimized packet processing architecture for battery powered mobile communication device |
US20100132032A1 (en) * | 2008-11-25 | 2010-05-27 | Lenovo (Singapore) Pte. Ltd. | Facilitating access to data from virtual private networks |
US9401903B2 (en) * | 2008-11-25 | 2016-07-26 | Lenovo (Singapore) Pte. Ltd. | Facilitating access to data from virtual private networks |
US9344215B2 (en) | 2012-10-15 | 2016-05-17 | Marvell World Trade Ltd. | Systems and methods for advanced power management for optical network terminal systems on chip |
CN106788571A (en) * | 2014-07-25 | 2017-05-31 | 山东中鸿新能源科技有限公司 | A kind of cloud terminal 3G/4G modules with highly compatible energy |
CN106788570A (en) * | 2014-07-25 | 2017-05-31 | 山东中鸿新能源科技有限公司 | A kind of compatibility cloud terminal 3G/4G modules high |
Also Published As
Publication number | Publication date |
---|---|
US20080004011A1 (en) | 2008-01-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8006110B2 (en) | Method and apparatus for keeping a virtual private network session active on a portable computer system including wireless functionality | |
US20080004039A1 (en) | Portable computer system having wireless communication functionality and global geographic positioning functionality | |
US9268959B2 (en) | Trusted security zone access to peripheral devices | |
US8254884B2 (en) | System and method for application program operation on a wireless device | |
US8537856B2 (en) | Communication subsystem for wireless devices or the like | |
US9497030B2 (en) | Remotely controllable electronic device and system including the same | |
US20080022325A1 (en) | Portable computing platform including wireless communication functionality and extended multimedia broadcast multicast service functionality | |
US20040233930A1 (en) | Apparatus and method for mobile personal computing and communications | |
US20070294457A1 (en) | USB wireless network drive | |
US7717350B2 (en) | Portable computing platform having multiple operating modes and heterogeneous processors | |
US20100299719A1 (en) | Remote Verification for Configuration Updates | |
US20140287685A1 (en) | Portable bridge device | |
US20140019743A1 (en) | Computing devices and methods for resetting inactivity timers on computing devices | |
EP2671407B1 (en) | System and method for host and operative system agnostic management of connected devices through network controlled state alteration | |
US20100174820A1 (en) | Network connection manager | |
US20120329431A1 (en) | Cellular Telephone System and Method | |
US20080004012A1 (en) | Portable computing platform including wireless communication functionality | |
JP5678766B2 (en) | Information processing apparatus, remote operation communication apparatus, and information processing apparatus control method | |
TWI766035B (en) | System and method for device management | |
EP2685350B1 (en) | Computing devices and methods for resetting inactivity timers on computing devices | |
JP2009177738A (en) | Mobile terminal adapter | |
KR101389077B1 (en) | Arraratus and method for controlling to drive from idle status to active status of usb-device supported selective suspend mode in network system | |
KR100821404B1 (en) | Method and apparatus for sharing a gprs module with two computing devices | |
JP2002312300A (en) | Information processing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ADVANCED MICRO DEVICES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:POLZIN, R. STEPHEN;REEL/FRAME:018071/0659 Effective date: 20060510 |
|
AS | Assignment |
Owner name: ADVANCED MICRO DEVICES, INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR'S NAME PREVIOUSLY RECORDED AT REEL 018071 FRAME 0659;ASSIGNOR:OBER, ROBERT;REEL/FRAME:018897/0650 Effective date: 20060510 Owner name: ADVANCED MICRO DEVICES, INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR'S NAME PREVIOUSLY RECORDED AT REEL 018071 FRAME 0659. ASSIGNOR CONFIRMS THE ASSIGNMENT;ASSIGNOR:OBER, ROBERT;REEL/FRAME:018897/0650 Effective date: 20060510 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |